A device may determine first configuration information associated with configuring a chassis. The device may configure the chassis in a first mode using the first configuration information to cause the chassis to perform routing for a network. The device may determine, after a first period of routing for the network, second configuration information associated with configuring the chassis. The second configuration information may relate to utilizing one or more computing resources of a server device external to the chassis to perform routing for the chassis. The device may configure the chassis in a second mode using the second configuration information to cause the chassis to perform, in a second period, routing for the network.
|
8. A non-transitory computer-readable medium storing instructions, the instructions comprising:
one or more instructions that, when executed by one or more processors, cause the one or more processors to:
determine, after a first period of routing for a network, configuration information associated with configuring a chassis to migrate a network slice routing functionality between a first virtual machine implemented by computing resources of the chassis and a second virtual machine implemented by computing resources of a server device external to the chassis; and
configure the chassis using the configuration information to migrate the network slice routing functionality between the first virtual machine and the second virtual machine,
the configuration information indicating:
a portion of a data plane, associated with the network slice, that is to be routed utilizing the second virtual machine, and
another portion of the data plane, associated with another network slice, that is to be routed utilizing the first virtual machine.
1. A device, comprising:
one or more memories:
one or more processors, communicatively coupled to the one or more memories, to:
determine first configuration information associated with configuring a chassis;
configure the chassis in a first mode using the first configuration information to cause the chassis to perform routing for a network;
determine, after a first period of routing for the network, second configuration information associated with configuring the chassis,
the second configuration information relating to utilizing one or more computing resources of a server device external to the chassis to perform routing for the chassis;
configure the chassis in a second mode using the second configuration information to cause the chassis to perform, in a second period, routing for the network; and
transmit one or more instructions to the server device to cause routing to be configured for the server device,
the one or more instructions including an instruction regarding a portion of a data plane that is to be routed utilizing the one or more computing resources of the server device, and
another portion of the data plane is to be routed using one or more computing resources associated with the chassis.
15. A method, comprising:
determining, by a device, first configuration information associated with configuring a chassis,
the first configuration information relating to utilizing only one or more computing resources of the chassis to perform routing for the chassis;
configuring, by the device, the chassis in a first mode using the first configuration information to cause the chassis to perform routing for a network;
determining, by the device and after configuring the chassis in the first mode, second configuration information associated with configuring the chassis,
the second configuration information relating to utilizing one or more computing resources of a server device external to the chassis to perform routing for the chassis; and
configuring, by the device, the chassis in a second mode using the second configuration information to cause the chassis to perform routing for the network,
a network slice, representing a portion of a data plane, to be migrated from a first virtual machine implemented using the one or more computing resources of the chassis to a second virtual machine implemented using the one or more computing resources of the server device,
another network slice, representing another portion of the data plane, to be routed utilizing one or more computing resources of the chassis, and
the migration to be performed using a state transition of the first virtual machine from a primary state to a backup state and the second virtual machine from a backup state to a primary state.
2. The device of
configure a set of virtual machines implemented by one or more computing resources of the chassis to perform routing for the network.
3. The device of
configure a plurality of network slices for routing network traffic for the network.
4. The device of
5. The device of
receive advertising information from the server device,
the advertising information identifying a set of capabilities of the server device; and
where the one or more processors, when determining the second configuration information, are to:
determine the second configuration information based on the advertising information.
6. The device of
monitor a health of one or more computing resources of the chassis; and
generate an alert or store an error log entry based on the health of the one or more computing resources of the chassis.
7. The device of
receive a health status report regarding the one or more computing resources of the server device from the server device; and
generate an alert or store an error log entry based on the health status report.
9. The non-transitory computer-readable medium of
disable a third virtual machine, of the chassis, that is configured as a backup to the first virtual machine,
the first virtual machine being configured as a primary virtual machine;
cause the second virtual machine to be configured as the backup to the first virtual machine;
cause, after causing the second virtual machine to be configured as the backup to the first virtual machine, a state transition for the first virtual machine and the second virtual machine,
the first virtual machine switching from the primary virtual machine to the backup,
the second virtual machine switching from the backup to the primary virtual machine; and
disable the first virtual machine after causing the state transition.
10. The non-transitory computer-readable medium of
disable a third virtual machine, of the server device, that is configured as a backup to the second virtual machine,
the second virtual machine being configured as a primary virtual machine;
cause the first virtual machine to be configured as the backup to the second virtual machine;
cause, after causing the first virtual machine to be configured as the backup to the second virtual machine, a state transition for the second virtual machine and the first virtual machine,
the second virtual machine switching from the primary virtual machine to the backup,
the first virtual machine switching from the backup to the primary virtual machine; and
disable the second virtual machine after causing the state transition.
11. The non-transitory computer-readable medium of
cause network traffic to be routed for the network slice based on configuring the chassis.
12. The non-transitory computer-readable medium of
13. The non-transitory computer-readable medium of
configure the chassis to switch from a first mode, where the chassis performs routing for the network including the network slice independently of the server device, to a second mode where the chassis uses one or more computing resources of the server device to perform routing for the network.
14. The non-transitory computer-readable medium of
switch between a first backup virtual machine implemented by the chassis and a second backup virtual machine implemented by the server device.
16. The method of
establishing one or more virtual machines operating using the one or more computing resources of the server device to perform network traffic routing for the chassis.
17. The method of
18. The method of
providing a user interface to receive the first configuration information or the second configuration information.
19. The method of
monitoring a health of one or more computing resources of the chassis; and
generating an alert or store an error log entry based on the health of the one or more computing resources of the chassis.
20. The method of
receiving a health status report regarding the one or more computing resources of the server device from the server device; and
generating an alert or store an error log entry based on the health status report.
|
A set of network devices may perform network traffic routing for a network. For example, a particular network device housed in a chassis may include a set of virtual machines that provide a switching functionality, a packet processing functionality, a routing functionality, or the like for the particular network device. The particular network device may establish the set of virtual machines to provide multiple network slices for network traffic routing. Each network slice may be associated with control functionalities and management functionalities that may be separated from each other network slice. The particular network device may connect to, for example, a server, which may provide computing resources for the particular network device, such as storage resources, processing resources, or the like. The computing resources may be utilized for the set of virtual machines.
According to some possible implementations, a device may include one or more processors. The one or more processors may determine first configuration information associated with configuring a chassis. The one or more processors may configure the chassis in a first mode using the first configuration information to cause the chassis to perform routing for a network. The one or more processors may determine, after a first period of routing for the network, second configuration information associated with configuring the chassis. The second configuration information may relate to utilizing one or more computing resources of a server device external to the chassis to perform routing for the chassis. The one or more processors may configure the chassis in a second mode using the second configuration information to cause the chassis to perform, in a second period, routing for the network.
According to some possible implementations, a non-transitory computer-readable medium may store one or more instructions that, when executed by one or more processors, cause the one or more processors to determine configuration information associated with configuring a chassis to migrate a network slice routing functionality between a first virtual machine implemented by computing resources of the chassis and a second virtual machine implemented by computing resources of a server device external to the chassis. The one or more instructions, when executed by one or more processors, may cause the one or more processors to configure the chassis using the configuration information to migrate the network slice routing functionality between the first virtual machine and the second virtual machine.
According to some possible implementations, a method may include determining, by a device, first configuration information associated with configuring a chassis. The first configuration information may relate to utilizing only one or more computing resources of the chassis to perform routing for the chassis. The method may include configuring, by the device, the chassis in a first mode using the first configuration information to cause the chassis to perform routing for a network. The method may include determining, by the device and after configuring the chassis in the first mode, second configuration information associated with configuring the chassis. The second configuration information may relate to utilizing one or more computing resources of a server device external to the chassis to perform routing for the chassis. The method may include configuring, by the device, the chassis in a second mode using the second configuration information to cause the chassis to perform routing for the network. A network slice may be migrated from a first virtual machine implemented using the one or more computing resources of the chassis to a second virtual machine implemented using the one or more computing resources of the server device. The migration may be performed using a state transition of the first virtual machine from a primary state to a backup state and the second virtual machine from a backup state to a primary state.
The following detailed description of example implementations refers to the accompanying drawings. The same reference numbers in different drawings may identify the same or similar elements.
A network operator may utilize a set of network devices to perform switching and routing for a network. The set of network devices may be included in a chassis. For example, a particular chassis may include a set of routers with a set of physical interface cards (PICs), flexible PIC concentrators (FPCs), control board (CB) switches, or the like. The network operator may establish multiple network slices for the chassis using multiple virtual machines operated using computing resources of the chassis. Each network slice may provide a control plane and a management plane, and may perform routing for a portion of network traffic of a data plane. However, resources for establishing network slices may be limited for a particular chassis, which may reduce scalability of the network. The network operator may utilize a server to operate the virtual machines external to the chassis. However, initial investment to install the server may be excessive for an initial requirement for network traffic routing, and may result in an excessive footprint and excessive power resource utilization to perform routing for the network.
Some implementations, described herein, provide hybrid network traffic routing utilizing virtual machines. For example, a chassis may be configured to perform network traffic routing using virtual machines of the chassis to establish network slices, and may be reconfigured at a subsequent time to perform network traffic routing using one or more virtual machines operating on an external server that is subsequently installed. In this way, scalability may be improved relative to a chassis that operates each virtual machine locally, and resource utilization, expense, and footprint may be deferred relative to requiring a server to be installed with the chassis for a network that is not initially associated with network traffic routing exceeding a capability of the chassis alone. Moreover, some implementations, described herein, may manage migration of a virtual machine from operating locally in a chassis to operating remotely in a server. In this way, computing resources allocated for network traffic routing may be increased by installing a server remote to the chassis and without interrupting network traffic routing by deactivating the chassis for reconfiguration of a virtual machine.
As further shown in
As shown in
As further shown in
In some implementations, configuration device 115 may configure additional virtual machines 125 or 160, fewer virtual machines 125 or 160, or different virtual machines 125 or 160 than the virtual machines 125 or 160 when reconfiguring network traffic routing for chassis 105. For example, configuration device 115 may cause one or more virtual machines 160 to be implemented on server 150, and may cause an update to network traffic routing (e.g., by causing computing resources implementing each network slice to update a routing table) to enable routing of network traffic using the one or more virtual machines 160. In some implementations, configuration device 115 may monitor a health of one or more virtual machines 160 via remote configuration device 155. In some implementations, configuration device 115 may migrate a virtual machine between routing element 110 and server 150 (e.g., from routing element 110 to server 150 or from server 150 to routing element 110).
In some implementations, configuration device 115 may migrate a network slice from a virtual machine 125 of chassis 105 to a virtual machine 160 of server 150. For example, configuration device 115 may determine, based on a set of computing resources of chassis 105 or allocated to a particular network slice of a particular virtual machine 125, that the particular network slice is to be migrated to server 150. Configuration device 115 may disable a backup virtual machine 125 corresponding to the particular virtual machine 125. Configuration device 115 may transmit a request to remote configuration device 155 to enable a virtual machine 160 as a backup for the particular network slice, and to synchronize a state of the virtual machine 160 as the backup and the particular virtual machine 125 as the primary for the particular network slice. In this case, based on determining that the virtual machine 160 is enabled as the backup for the particular network slice and synchronized with the particular virtual machine 125, configuration device 115 may trigger a switchover by transmitting information to remote configuration device 155 to cause a state change for the virtual machine 160 from backup to primary, and transmitting information to the particular virtual machine 125 to cause a state change from primary to backup. Based on the state changes, configuration device 115 may disable the particular virtual machine 125, configuration device 115 may cause the virtual machine 160 to route network traffic for the particular network slice, and configuration device 115 may cause remote configuration device 155 to enable another virtual machine 160 as a backup for the virtual machine 160 that is the primary for the particular network slice.
As further shown in
In this way, configuration device 115 of chassis 105 permits configuration of virtual machines 125 using computing resources of routing element 110 and subsequent reconfiguration of chassis 105 to include virtual machines 160 using computing resources of server 150. Based on delaying installation of server 150 until needed, configuration device 115 defers expenditure, footprint need, and utilization of energy resources until network traffic routing capacity associated with server 150 is needed. Moreover, based on integrating server 150, configuration device 115 expands network traffic routing capacity of chassis 105 relative to a chassis that utilizes native virtual machines and not remote virtual machines.
As indicated above,
Network device 210 includes one or more devices (e.g., one or more traffic transfer devices) capable of processing and/or transferring traffic between endpoint devices. For example, network device 210 may include a firewall, a router, a gateway, a switch device, a hub, a bridge, a reverse proxy, a server (e.g., a proxy server), a ToR switch, a load balancer, a switch interface board, a controller, a switching element, a packet processing component, or a similar device. In some implementations, network device 210 includes one or more computing resources to implement a virtual machine for routing network traffic for a network traffic slice. In some implementations, network device 210 may include a traffic transfer device associated with providing and/or receiving information. In some implementations, network device 210 may be housed in a chassis, such as a router chassis that includes multiple network devices 210. In some implementations, network device 210 may include a master orchestration module to control networking of a chassis. In some implementations, network device 210 may be a fabric line card of a switching fabric. In some implementations, network device 210 is included in, corresponds to, includes, and/or implements one or more of chassis 105, routing element 110, configuration device 115, switching device 120, virtual machines 125, and/or FPCs 130 as shown in
Server device 220 includes one or more devices capable of storing, processing, and/or routing information associated with routing network traffic. For example, server device 220 may include a server that includes computing resources that may be utilized to establish one or more virtual machines for network traffic routing. In some implementations, server device 220 may include a communication interface that allows server device 220 to receive information from and/or transmit information to other devices in environment 200. In some implementations, server device 220 may implement a remote configuration device that may communicate with a network device 210 of a chassis to configure one or more virtual machines to operate using computing resources of server device 220. In some implementations, server device 220 corresponds to and/or implements one or more of server 150, remote configuration device 155, and/or virtual machines 160 as shown in
Network device 210 and server device 220 may be associated with one or more networks, in some implementations. Similarly, a network, of the one or more networks, may include one or more network devices 210 and/or one or more server devices 220. In some implementations, the one or more networks may include a cellular network (e.g., a long-term evolution (LTE) network, a 3G network, a code division multiple access (CDMA) network, a 4G network, a 5G network, etc.), a public land mobile network (PLMN), a local area network (LAN), a wide area network (WAN), a metropolitan area network (MAN), a telephone network (e.g., the Public Switched Telephone Network (PSTN)), a private network, a cloud-based computing network, an ad hoc network, an intranet, the Internet, a fiber optic-based network, a cloud computing network, a virtual private network (VPN), a subnet network (e.g., a subnet), and/or a combination of these or other types of networks.
In implementations, network device 210 and/or server device 220 may be a virtual device implemented by one or more computer devices of a cloud computing environment or a data center.
The number and arrangement of devices shown in
Input component 305 may be points of attachment for physical links and may be points of entry for incoming traffic, such as packets. Input component 305 may process incoming traffic, such as by performing data link layer encapsulation or decapsulation. In some implementations, input component 305 may send and/or receive packets. In some implementations, input component 305 may include an input line card that includes one or more packet processing components (e.g., in the form of integrated circuits), such as one or more interface cards (IFCs), packet forwarding components, line card controller components, input ports, processors, memories, and/or input queues. In some implementations, device 300 may include one or more input components 305.
Switching component 310 may interconnect input components 305 with output components 315. In some implementations, switching component 310 may be implemented via one or more crossbars, via busses, and/or with shared memories. The shared memories may act as temporary buffers to store packets from input components 305 before the packets are eventually scheduled for delivery to output components 315. In some implementations, switching component 310 may enable input components 305, output components 315, and/or controller 320 to communicate.
Output component 315 may store packets and may schedule packets for transmission on output physical links. Output component 315 may support data link layer encapsulation or decapsulation, and/or a variety of higher-level protocols. In some implementations, output component 315 may send packets and/or receive packets. In some implementations, output component 315 may include an output line card that includes one or more packet processing components (e.g., in the form of integrated circuits), such as one or more IFCs, packet forwarding components, line card controller components, output ports, processors, memories, and/or output queues. In some implementations, device 300 may include one or more output components 315. In some implementations, input component 305 and output component 315 may be implemented by the same set of components (e.g., and input/output component may be a combination of input component 305 and output component 315).
Controller 320 includes a processor in the form of, for example, a central processing unit (CPU), a graphics processing unit (GPU), an accelerated processing unit (APU), a microprocessor, a microcontroller, a digital signal processor (DSP), a field-programmable gate array (FPGA), an application-specific integrated circuit (ASIC), and/or another type of processor. A processor is implemented in hardware, firmware, or a combination of hardware and software. In some implementations, controller 320 may include one or more processors that can be programmed to perform a function.
In some implementations, controller 320 may include a random access memory (RAM), a read only memory (ROM), and/or another type of dynamic or static storage device (e.g., a flash memory, a magnetic memory, an optical memory, etc.) that stores information and/or instructions for use by controller 320.
In some implementations, controller 320 may communicate with other devices, networks, and/or systems connected to device 300 to exchange information regarding network topology. Controller 320 may create routing tables based on the network topology information, create forwarding tables based on the routing tables, and forward the forwarding tables to input components 305 and/or output components 315. Input components 305 and/or output components 315 may use the forwarding tables to perform route lookups for incoming and/or outgoing packets.
Controller 320 may perform one or more processes described herein. Controller 320 may perform these processes in response to executing software instructions stored by a non-transitory computer-readable medium. A computer-readable medium is defined herein as a non-transitory memory device. A memory device includes memory space within a single physical storage device or memory space spread across multiple physical storage devices.
Software instructions may be read into a memory and/or storage component associated with controller 320 from another computer-readable medium or from another device via a communication interface. When executed, software instructions stored in a memory and/or storage component associated with controller 320 may cause controller 320 to perform one or more processes described herein. Additionally, or alternatively, hardwired circuitry may be used in place of or in combination with software instructions to perform one or more processes described herein. Thus, implementations described herein are not limited to any specific combination of hardware circuitry and software.
As shown in
Bus 325 includes a component that permits communication among the components of device 300. Processor 330 is implemented in hardware, firmware, or a combination of hardware and software. Processor 330 takes the form of a central processing unit (CPU), a graphics processing unit (GPU), an accelerated processing unit (APU), a microprocessor, a microcontroller, a digital signal processor (DSP), a field-programmable gate array (FPGA), an application-specific integrated circuit (ASIC), or another type of processing component. In some implementations, processor 330 includes one or more processors capable of being programmed to perform a function. Memory 335 includes a random access memory (RAM), a read only memory (ROM), and/or another type of dynamic or static storage device (e.g., a flash memory, a magnetic memory, and/or an optical memory) that stores information and/or instructions for use by processor 330.
Storage component 340 stores information and/or software related to the operation and use of device 300. For example, storage component 340 may include a hard disk (e.g., a magnetic disk, an optical disk, a magneto-optic disk, and/or a solid state disk), a compact disc (CD), a digital versatile disc (DVD), a floppy disk, a cartridge, a magnetic tape, and/or another type of non-transitory computer-readable medium, along with a corresponding drive.
Input component 345 includes a component that permits device 300 to receive information, such as via user input (e.g., a touch screen display, a keyboard, a keypad, a mouse, a button, a switch, and/or a microphone). Additionally, or alternatively, input component 345 may include a sensor for sensing information (e.g., a global positioning system (GPS) component, an accelerometer, a gyroscope, and/or an actuator). Output component 350 includes a component that provides output information from device 300 (e.g., a display, a speaker, and/or one or more light-emitting diodes (LEDs)).
Communication interface 355 includes a transceiver-like component (e.g., a transceiver and/or a separate receiver and transmitter) that enables device 300 to communicate with other devices, such as via a wired connection, a wireless connection, or a combination of wired and wireless connections. Communication interface 355 may permit device 300 to receive information from another device and/or provide information to another device. For example, communication interface 355 may include an Ethernet interface, an optical interface, a coaxial interface, an infrared interface, a radio frequency (RF) interface, a universal serial bus (USB) interface, a Wi-Fi interface, a cellular network interface, or the like.
Software instructions may be read into memory 335 and/or storage component 340 from another computer-readable medium or from another device via communication interface 355. When executed, software instructions stored in memory 335 and/or storage component 340 may cause processor 330 to perform one or more processes described herein. Additionally, or alternatively, hardwired circuitry may be used in place of or in combination with software instructions to perform one or more processes described herein. Thus, implementations described herein are not limited to any specific combination of hardware circuitry and software.
The number and arrangement of components shown in
As shown in
In some implementations, network device 210 may determine first configuration information identifying a quantity of virtual machines to establish for the chassis. For example, network device 210 may provide a user interface, and may receive, via the user interface, an instruction from a network operator to establish a particular quantity of virtual machines using computing resources of the chassis (e.g., computing resources of network device 210, computing resources of another network device 210, etc.). Additionally, or alternatively, network device 210 may detect a characteristic of a network, such as a network traffic throughput, and may determine a quantity of virtual machines based on the characteristic of the network. Additionally, or alternatively, network device 210 may determine the quantity of virtual machines based on resources of the chassis. For example, based on detecting a particular quantity of cores and a particular size of memory resources, network device 210 may determine to establish a particular quantity of virtual machines.
In this way, network device 210 obtains first configuration information for establishing network traffic routing for the chassis.
As further shown in
In this way, network device 210 configures the chassis to perform network traffic routing using local virtual machines that operate using resources of the chassis.
As further shown in
In some implementations, network device 210 may monitor a health of a set of virtual machines when routing network traffic. For example, network device 210 may monitor one or more virtual machines operating using resources of the chassis, directly, and may transmit information to server device 220 to cause server device 220 to monitor one or more virtual machines operating using resources of server device 220. In this case, server device 220 may be caused to transmit one or more health status reports to network device 210 to identify a status of the virtual machines operating using resources of server device 220. In some implementations, network device 210 may provide information associated with a health of the set of virtual machines. For example, network device 210 may transmit an alert, store an error log entry in an error log, alter a configuration of the set of virtual machines, restart one or more virtual machines, remove one or more virtual machines, add another virtual machine, alter a state of a virtual machine (e.g., from a backup state to a primary state, from a primary state to a backup state, etc.), or the like based on determining the health of the set of virtual machines.
As further shown in
In some implementations, network device 210 may receive second configuration information identifying a quantity of virtual machines to implement using the resources of the chassis and resources of server device 220. For example, network device 210 may provide a user interface, and may receive, via the user interface, an indication of a quantity of network slices, guest network functions, or the like that are to be implemented.
In some implementations, network device 210 may determine second configuration information relating to migrating network traffic routing between the chassis and server device 220. For example, network device 210 may determine that resources of the chassis satisfy a threshold, and may determine to migrate network traffic routing from a virtual machine of the chassis to a virtual machine of server device 220, to enable additional computing resources to be allocated for network traffic routing. In some implementations, network device 210 may determine the second configuration information relating to migrating network traffic routing based on receiving user input via a user interface. For example, network device 210 may receive user input indicating that a particular quantity of computing resources (e.g., processing resources, memory resources, storage resources, etc.) is to be allocated to a particular network slice, and may determine that the chassis does not satisfy a threshold resource availability to allocate the particular quantity of computing resources for the particular network slice. In this case, network device 210 may determine second configuration information to migrate the network slice from the chassis to server device 220 to enable the particular quantity of computing resources to be allocated for the particular network slice.
In this way, network device 210 receives second configuration information to integrate resources of server device 220 into the chassis for network traffic routing or migrate network traffic routing between the chassis and server device 220.
As further shown in
In some implementations, network device 210 may determine a first subset of virtual machines to operate using resources of the chassis and a second subset of virtual machines to operate using resources of server device 220. For example, network device 210 may determine, based on the second configuration information, to operate a first virtual machine locally using resources of the chassis and to operate a second virtual machine remotely using resources of server device 220. In some implementations, network device 210 may establish a set of network slices using resources of server device 220 based on the second configuration information. For example, based on receiving second configuration information indicating that network device 210 is to establish a quantity of network slices greater than a threshold (e.g., greater than a quantity of virtual machines that can be operated using resources of the chassis), network device 210 may establish one or more network slices using one or more virtual machines of server device 220. In this case, network device 210 may transmit information to server device 220 to allocate a portion of the data plane to server device 220 and to cause server device 220 to allocate computing resources to a set of virtual machines. In this case, the chassis and server device 220 route network traffic for a network.
In some implementations, network device 210 may migrate routing functionality between the chassis and server device 220 to configure network traffic routing. In some implementations, network device 210 may migrate the routing functionality using a state transition. For example, network device 210 may transmit a message to server device 220 to cause a virtual machine of server device 220 to transition from a backup state to a primary state, and may cause a virtual machine of the chassis to transition from a primary state to a backup state, to cause a network slice to migrate from being routed using the chassis to being routed using server device 220. In some implementations, the state transition may occur concurrently. In some implementations, the state transition may occur sequentially, such as within a threshold period of time. In this way, network device 210 reduces a likelihood of dropped network traffic for the network slice during migration.
In some implementations, network device 210 may migrate a network slice routing functionality from the chassis to server device 220. For example, based on the second configuration information, network device 210 may cause a first, backup virtual machine for a second, primary virtual machine of the chassis to be disabled; a third virtual machine of server device 220 to be enabled as a backup for a third virtual machine of the primary virtual machine of the chassis; the second, primary virtual machine of the chassis to be switched to a backup, second virtual machine and the backup, third virtual machine of server device 220 to be switched to a primary, third virtual machine; and the backup, second virtual machine to be disabled. In this way, network device 210 may migrate a network slice from operating on the second virtual machine of the chassis to the third virtual machine of server device 220.
In some implementations, network device 210 may migrate a network slice routing functionality from server device 220 to the chassis. For example, network device 210 may cause a first, backup virtual machine of server device 220 for a second, primary virtual machine of server device 220 to be disabled; a third virtual machine of the chassis to be enabled as a backup, third virtual machine of the primary virtual machine of server device 220; the second, primary virtual machine to be switched to a backup, second virtual machine and the backup, third virtual machine to be switched to a primary, third virtual machine; and the backup, second virtual machine to be disabled. In this way, network device 210 may migrate a network slice from operating on the second virtual machine of server device 220 to operating on the third virtual machine of the chassis.
Although
As shown in
As shown in
As shown in
As shown in
As shown in
As indicated above,
In this way, network device 210 may enable a network traffic routing capability of a chassis to be expanded by dynamically reconfiguring the chassis to utilize resources of server device 220 for network traffic routing, to migrate a network slice between virtual machines operating on the chassis and virtual machines operating on server device 220, or the like. Moreover, based on integrating one or more server devices 220 and the chassis, network device 210 may improve network traffic routing, such as by improving routing throughput, reducing dropped packets, or the like. Furthermore, network device 210 may enable automatic configuration of network traffic routing and migration of routing functionalities for a chassis and/or server device 220 (i.e., without intervention of a network operator to perform manual configuration after power up).
The foregoing disclosure provides illustration and description, but is not intended to be exhaustive or to limit the implementations to the precise form disclosed. Modifications and variations are possible in light of the above disclosure or may be acquired from practice of the implementations.
As used herein, the term component is intended to be broadly construed as hardware, firmware, and/or a combination of hardware and software.
Some implementations are described herein in connection with thresholds. As used herein, satisfying a threshold may refer to a value being greater than the threshold, more than the threshold, higher than the threshold, greater than or equal to the threshold, less than the threshold, fewer than the threshold, lower than the threshold, less than or equal to the threshold, equal to the threshold, etc.
It will be apparent that systems and/or methods, described herein, may be implemented in different forms of hardware, firmware, or a combination of hardware and software. The actual specialized control hardware or software code used to implement these systems and/or methods is not limiting of the implementations. Thus, the operation and behavior of the systems and/or methods were described herein without reference to specific software code—it being understood that software and hardware can be designed to implement the systems and/or methods based on the description herein.
Even though particular combinations of features are recited in the claims and/or disclosed in the specification, these combinations are not intended to limit the disclosure of possible implementations. In fact, many of these features may be combined in ways not specifically recited in the claims and/or disclosed in the specification. Although each dependent claim listed below may directly depend on only one claim, the disclosure of possible implementations includes each dependent claim in combination with every other claim in the claim set.
No element, act, or instruction used herein should be construed as critical or essential unless explicitly described as such. Also, as used herein, the articles “a” and “an” are intended to include one or more items, and may be used interchangeably with “one or more.” Furthermore, as used herein, the term “set” is intended to include one or more items (e.g., related items, unrelated items, a combination of related and unrelated items, etc.), and may be used interchangeably with “one or more.” Where only one item is intended, the term “one” or similar language is used. Also, as used herein, the terms “has,” “have,” “having,” or the like are intended to be open-ended terms. Further, the phrase “based on” is intended to mean “based, at least in part, on” unless explicitly stated otherwise.
Patent | Priority | Assignee | Title |
10684666, | Sep 11 2018 | Dell Products L.P.; Dell Products L P | Startup orchestration of a chassis system |
11246088, | Apr 10 2020 | Cisco Technology, Inc.; Cisco Technology, Inc | Failover and management of multi-vendor network slices |
Patent | Priority | Assignee | Title |
8943489, | Jun 29 2012 | Juniper Networks, Inc. | High availability in-service software upgrade using virtual machine instances in dual computing appliances |
8953439, | Dec 31 2012 | Juniper Networks, Inc | Separation of control plane functions using virtual machines in network device |
20130091376, | |||
20130346470, | |||
20160364174, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jun 02 2017 | Juniper Networks, Inc. | (assignment on the face of the patent) | / | |||
Jun 02 2017 | GHOSH, SANDIP KUMAR | Juniper Networks, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 042578 | /0203 |
Date | Maintenance Fee Events |
Oct 20 2022 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
May 14 2022 | 4 years fee payment window open |
Nov 14 2022 | 6 months grace period start (w surcharge) |
May 14 2023 | patent expiry (for year 4) |
May 14 2025 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 14 2026 | 8 years fee payment window open |
Nov 14 2026 | 6 months grace period start (w surcharge) |
May 14 2027 | patent expiry (for year 8) |
May 14 2029 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 14 2030 | 12 years fee payment window open |
Nov 14 2030 | 6 months grace period start (w surcharge) |
May 14 2031 | patent expiry (for year 12) |
May 14 2033 | 2 years to revive unintentionally abandoned end. (for year 12) |